STELLIETECH
  • Home
  • Information
    • FAQ
    • Blog
    • About us
  • Courses
    • Microsoft Office Courses >
      • Microsoft Word
      • Microsoft Word Expert
      • Microsoft Excel
      • Microsoft Excel Expert
      • Microsoft Access
      • Microsoft Access Expert
      • Microsoft Outlook
      • Microsoft PowerPoint
    • Adobe Suite Courses >
      • Adobe After Effects
      • Adobe Dreamweaver
      • Adobe Illustrator
      • Adobe InDesign
      • Adobe Photoshop
      • Adobe Premiere Pro
    • IT Specialist >
      • HTML 5 Application Development
      • Cloud Computing
      • Computational Thinking
      • Device Configuration and Management
      • HTML and CSS
      • Python Course
      • Java Course
      • Javascript Course
      • Network Security
      • Networking Course
      • Databases Course
    • Introduction to Computers >
      • Typing Course
      • Computer Literacy
      • Digital Literacy
    • Office Administration
    • CompTIA Courses >
      • CompTIA Security+ Course
      • CompTIA Network+ Course
      • CompTIA A+ Course
    • Cyber Security >
      • Ethical Hacking Associate (EC-Council)
    • Health and Safety Courses >
      • Working at Heights
      • Health and Safety Representative
      • Covid-19 Workplace Readiness
    • MTA Courses >
      • MTA - Cloud Fundamentals
      • MTA - Database Administration Fundamentals
      • MTA - HTML5 Application Development Fundamentals
      • MTA - Introduction to Programming using Java Course
      • MTA - Introduction to Programming using JavaScript Course
      • MTA - Introduction to Programming using HTML and CSS Course
      • MTA - Mobility and Devices Fundamentals
      • MTA - Networking Fundamentals
      • MTA - Security Fundamentals
      • MTA - Software Development Fundamentals
      • MTA - Windows Operating System Fundamentals
  • Certify
    • Exams
    • Practice Tests
  • E-learning
    • Learn Online
    • Course Creation
    • Custom E-learning
    • Virtual event hosting
  • Contact
    • Request a Quote

MTA: Security Fundamentals Course

View Course
Excel 2016 Beginner Course - Online
INTERNATIONALLY ACCREDITED
Picture
Picture
Duration:
3 Days

Dates and Times: 
Monday - Friday (09h00 - 16h00)
Price:
​
R3465.00 per person.
​
(excl VAT)
Certificate of training:
Yes
Recommended Prerequisites:
​Learners are required to have knowledge, comprehension and application of English at Grade 10 or equivalent.
Venue: Stellenbosch 
UNIT B12, Carpe Diem Building
26 Quantum Street, Techno Park
​Stellenbosch

7600

​
OR

Online Training 
100% Remote
Follow Up Courses:
Other MTA courses 
  • Course Overview
  • Benefits
  • Detailed Outline
<
>

MTA Security Fundamentals (98-367) Course

MTA Security Fundamentals is designed to provide students with an explanation and understanding of fundamental security concepts. MTA is a new certification program that Microsoft has created specifically for students entering into the IT industry for the first time. It validates the foundational knowledge needed to build and secure Microsoft Windows Servers, Windows-based network operating systems, Active Directory, account management, and system recovery tools. The MTA Security Fundamentals certification is a pathway for future certifications and career opportunities. Expert Tom Carpenter guides you through each exam objective seamlessly, all the while preparing you for the Microsoft exam 98-367. This course provides you with interactive videos that meet the needs of multiple styles of learning from auditory to visual. The MTA Security Fundamentals eLearning course includes a pre test and post test that accurately identifies your skill gap. Carpenter will guide you step by step and help you close your skill gap with content concentrating on each exam objective. Achieving MTA certifications is the first step toward becoming a Microsoft Certified Technology Specialist. (MCTS)
  • Understand the 3 security layers: Physical, Internet, and Wireless security
  • Understand operating system security concepts
  • Understand network security
  • Understand and utilize security software and intrusion detection tools
Core Security Principles
  • Confidentiality
  • Integrity, Availability
  • Threats and Risk Impacts
  • Risk Register
  • Principle of Least Privilege
  • Social Engineering
  • Attack Surfaces, Threat Modeling

Physical Security
  • Site Security
  • Computer Security, Removable Drives
  • Access Control, Device Security

Internet Security
  • Browser Security Settings
  • Secure Websites

Wireless Security
  • Security Types
  • SSIDs, MAC Filters

User Authentication
  • Multifactor Authentication
  • Smart Cards
  • RADIUS
  • Biometrics
  • Administrative Tasks

Permissions
  • File System Permissions
  • Share Permissions
  • Registry
  • Active Directory
  • Permission Inheritance
  • Permissions When Copying or Moving Files
  • Multiple Groups and Permissions
  • Basic and Advanced Permissions
  • Take Ownership
  • Delegation

Password Policies
  • Password Complexity
  • Password Length and History
  • Account Lockout Policies
  • Use Group Policy to Enforce Policies
  • Common Attack Methods
  • Password Reset Procedures
  • Protect Domain Passwords

Audit Policies
  • Auditing Types
  • What Can Be Audited
  • Enable Auditing
  • What to Audit
  • Save Audit Information
  • Secure Audit Information

Encryption
  • EFS
  • Moving and Copying EFS Files
  • BitLocker
  • Hardware and Software-Based Encryption
  • Mall Encryption
  • VPN
  • Public and Private Keys
  • Encryption Algorithms
  • Certificate Properties
  • Certificate Services
  • PKI
  • Token and Lockdown Devices
Malware
  • Buffer Overflow
  • Viruses, Worms, and Trojan Horses
  • Spyware, Ransomware, Adware
  • Rootkits
  • Backdoors, Zero Day Attacks

Dedicated Firewalls
  • Firewalls and Their Characteristics
  • Hardware Firewalls
  • Software Firewalls
  • Stateful and Stateless Inspection
  • Security Compliance Manager
  • Security Baselines

Network Isolation
  • Routing
  • Honeypot
  • Perimeter Networks
  • Network Address Translation
  • VPN and IPsec
  • Server and Domain Isolation

Protocol Security
  • Protocol Spoofing
  • IPsec, Tunneling and DNSSEC
  • Network Sniffing
  • DoS Attacks
  • Common Attack Methods

Client Protection
  • Antivirus
  • Unwanted Installation Protection and UAC
  • Operating System and Software Updates
  • Encrypt Offline Folders
  • Software Restriction Policies
  • Principle of Least Privilege

Understand Email Protection
  • Antispam and Antivirus
  • Spoofing, Phishing, and Pharming
  • Client and Server Protection
  • SPF Records
  • PTR Records

Server Protection
  • Separation of Services
  • Hardening
  • Keep Servers Updated
  • Secure Dynamic DNS Updates
  • Unsecure Authentication Protocols
  • Read-Only Domain Controllers

​Session 4 and Course Recap
  • Domain 4 Test Tips
  • Final Test Tips
  • Conclusion

    Request A Quote

Submit
Picture
Investing in South Africa's future: 
​“South African employers need a workforce that is skilled, adaptable, creative, and equipped for success in the global marketplace.” 

Powered by Create your own unique website with customizable templates.
  • Home
  • Information
    • FAQ
    • Blog
    • About us
  • Courses
    • Microsoft Office Courses >
      • Microsoft Word
      • Microsoft Word Expert
      • Microsoft Excel
      • Microsoft Excel Expert
      • Microsoft Access
      • Microsoft Access Expert
      • Microsoft Outlook
      • Microsoft PowerPoint
    • Adobe Suite Courses >
      • Adobe After Effects
      • Adobe Dreamweaver
      • Adobe Illustrator
      • Adobe InDesign
      • Adobe Photoshop
      • Adobe Premiere Pro
    • IT Specialist >
      • HTML 5 Application Development
      • Cloud Computing
      • Computational Thinking
      • Device Configuration and Management
      • HTML and CSS
      • Python Course
      • Java Course
      • Javascript Course
      • Network Security
      • Networking Course
      • Databases Course
    • Introduction to Computers >
      • Typing Course
      • Computer Literacy
      • Digital Literacy
    • Office Administration
    • CompTIA Courses >
      • CompTIA Security+ Course
      • CompTIA Network+ Course
      • CompTIA A+ Course
    • Cyber Security >
      • Ethical Hacking Associate (EC-Council)
    • Health and Safety Courses >
      • Working at Heights
      • Health and Safety Representative
      • Covid-19 Workplace Readiness
    • MTA Courses >
      • MTA - Cloud Fundamentals
      • MTA - Database Administration Fundamentals
      • MTA - HTML5 Application Development Fundamentals
      • MTA - Introduction to Programming using Java Course
      • MTA - Introduction to Programming using JavaScript Course
      • MTA - Introduction to Programming using HTML and CSS Course
      • MTA - Mobility and Devices Fundamentals
      • MTA - Networking Fundamentals
      • MTA - Security Fundamentals
      • MTA - Software Development Fundamentals
      • MTA - Windows Operating System Fundamentals
  • Certify
    • Exams
    • Practice Tests
  • E-learning
    • Learn Online
    • Course Creation
    • Custom E-learning
    • Virtual event hosting
  • Contact
    • Request a Quote